NAT and Firewall Traversal. VoIP and MultiMedia /77
|
|
|
- Ross Shepherd
- 10 years ago
- Views:
Transcription
1 and Firewall Traversal VoIP and MultiMedia /77
2 Introduction Does anyone remember why we started working on IPv6? ICAN says IPv4 addresses will run out by 2011 XXXX says the same YYYY also confirms Oh, and MIT alone have more addresses than entire China! VoIP and MultiMedia /77
3 Introduction well ok but who cares about IPv4 addresses? we have s right? VoIP and MultiMedia 2011 [email protected] 3/77
4 Standard usage VoIP and MultiMedia /77
5 Less standard usage: End to end services? VoIP and MultiMedia /77
6 Introduction We need public IPs because of e2e services such as VoIP for example. Right, so do you know of any production IPv6 VoIP deployments? I don t! Through the rest of this presentation I ll try to explain why I think this is the case. VoIP and MultiMedia 2011 [email protected] 6/77
7 The basics of IP telephony A sample call network core (registrars, proxies, ) Bob Address: B Port: Pb Alice Address: A Port: Pa VoIP and MultiMedia 2011 [email protected] 7/77
8 The basics of IP telephony A sample call network core (registrars, proxies, ) Bob Address: B Port: Pb Alice Address: A Port: Pa VoIP and MultiMedia 2011 [email protected] 8/77
9 The basics of IP telephony. network core (registrars, proxies, ) MEDIA over (S)RTP Bob Address: B Port: Pb Alice Address: A Port: Pa VoIP and MultiMedia 2011 [email protected] 9/77
10 Session initialization with SIP and XMPP INVITE SIP/2.0 Via: SIP/2.0/UDP ;branch=1 From: To: Contact: Call-ID: Cseq: INVITE v=0 o=user IP s=. t=0 0 c=in IP m=audio RTP/AVP 0 a=rtpmap:0 PCMU/8000 <iq from='[email protected]/balcony' id='hs81w639' to='[email protected]/orchard' type='set'> <jingle xmlns='urn:xmpp:jingle:1' action='session-accept' initiator='[email protected]/orchard' responder='[email protected]/balcony' sid='a73sjjvkla37jfea'> <content creator='initiator' name='voice'> <description xmlns='urn:xmpp:jingle:apps:rtp:1' media='audio'> <payload-type id='18' name='g729'/> </description> <transport xmlns='urn:xmpp:jingle:transports:raw-udp:1'> <candidate component='1' generation='0' id='z7sdjb01hf' ip=' ' port='9876'/> <candidate component='2' generation='0' id='hg92lsn10b' ip=' ' port='9877'/> </transport> </content> </jingle> </iq> VoIP and MultiMedia 2011 [email protected] 10/77
11 And then s were born Call: To: B Media: Ap Call: To: B Media: Ap ERROR Alice Private Address: Ap /Firewall Address: F Bob Address: B VoIP and MultiMedia 2011 [email protected] 11/77
12 Internal host:port How do s work port : MSG: Dst: : 80 Src: : 2368 MSG: Dst: : 80 Src: : 8632 Alice Internal Address: Public Address: Server Address: VoIP and MultiMedia 2011 [email protected] 12/77
13 Internal host:port How do s work port : MSG: Dst: : 2368 Src: : 80 MSG: Dst: : 8632 Src: : 80 Alice Internal Address: Public Address: Server Address: VoIP and MultiMedia 2011 [email protected] 13/77
14 Internal host:port How do s work port : Endpoint-Independent Mapping Endpoint-Independent Filtering Bob Address: MSG: Dst: : 2368 Src: : 9595 Alice Internal Address: Public Address: Server Address: VoIP and MultiMedia 2011 [email protected] 14/77
15 Basic Firewall and Traversal STUN What are my address and port? Address: F Port: Pf STUN Server Alice Address: Ap Port: Pa Address: F Bob Address: B Call: To: B Media: F:Pf STUN Server Alice Address: Ap Port: Pa Answer: To: A Media: B Bob Address: B VoIP and MultiMedia 2011 [email protected] 15/77
16 STUN Demystified RFC STUN Message Type Message Length Magic Cookie Transaction ID (96 bits) Stun Attributes " Format of STUN Message Header " VoIP and MultiMedia 2011 [email protected] 16/77
17 STUN Binding Request x0001 Message Length Magic Cookie Transaction ID (96 bits) Format of STUN Message Header " VoIP and MultiMedia 2011 [email protected] 17/77
18 STUN Attributes RFC Type Length Value (variable) Format of STUN Attributes" VoIP and MultiMedia 2011 [email protected] 18/77
19 STUN Mapped Address x0001 Length Family Port Address (32 bits or 128 bits) Format of MAPPED-ADDRESS Attribute" The address family can take on the following values: 0x01:IPv4 0x02:IPv6" VoIP and MultiMedia 2011 [email protected] 19/77
20 STUN XOR-MAPPED-ADDRESS x0020 Length x x x x x x x x Family X-Port X-Address (Variable) " Format of XOR-MAPPED-ADDRESS Attribute " The address family can take on the following values: 0x01:IPv4 0x02:IPv6" VoIP and MultiMedia 2011 [email protected] 20/77
21 STUN User Name x0006 Length Value (variable) Format of STUN User Name Attribute" VoIP and MultiMedia 2011 [email protected] 21/77
22 How do s work Address (and port) dependent filtering Internal host:port port Active connections host:port : (: 80) MSG: Dst: : 80 Src: : 2368 MSG: Dst: : 80 Src: : 8632 Alice Internal Address: Public Address: STUN Server Address: VoIP and MultiMedia 2011 [email protected] 22/77
23 How do s work Address (and port) dependent filtering Internal host:port port Active connections host:port : (: 80) MSG: Dst: : 2368 Src: : 80 MSG: Dst: : 8632 Src: : 80 Alice Internal Address: Public Address: STUN Server Address: VoIP and MultiMedia 2011 [email protected] 23/77
24 How do s work Address (and port) dependent filtering Internal host:port port Active connections host:port : (: 80) Endpoint-Independent Mapping Endpoint-Dependent Filtering Bob Address: STOP Alice Internal Address: Public Address: STUN Server Address: VoIP and MultiMedia 2011 [email protected] 24/77
25 How do s work Address (and port) dependent filtering Internal host:port port Active connections host:port : (: 80) (: 80) Bob Address: MSG: Dst: : 80 Src: : 2368 Alice Internal Address: Public Address: STUN Server Address: VoIP and MultiMedia 2011 [email protected] 25/77
26 How do s work Address (and port) dependent filtering Internal host:port port Active connections host:port : (: 80) Endpoint-Independent Mapping Endpoint-Dependent Filtering (: 80) Bob Address: MSG: Dst: : 2368 Src: : 80 Alice Internal Address: Public Address: STUN Server Address: VoIP and MultiMedia 2011 [email protected] 26/77
27 How do s work Endpoint dependent mapping Internal host:port port Active connections host:port : (: 80) MSG: Dst: : 80 Src: : 2368 MSG: Dst: : 80 Src: : 8632 Alice Internal Address: Public Address: STUN Server Address: VoIP and MultiMedia 2011 [email protected] 27/77
28 How do s work Endpoint dependent mapping Internal host:port port Active connections host:port : (: 80) MSG: Dst: : 2368 Src: : 80 MSG: Dst: : 8632 Src: : 80 Alice Internal Address: Public Address: STUN Server Address: VoIP and MultiMedia 2011 [email protected] 28/77
29 How do s work Endpoint dependent mapping Internal host:port port Active connections host:port : (: 80) : (: 80) Bob Address: MSG: Dst: : 80 Src: : 2368 Alice Internal Address: Public Address: STUN Server Address: VoIP and MultiMedia 2011 [email protected] 29/77
30 Internal host:port How do s work Endpoint dependent mapping port Active connections host:port : (: 80) : (: 80) Endpoint-Dependent Mapping Endpoint-Dependent Filtering MSG: Dst: : 2368 Src: : 80 Bob Address: Alice Internal Address: Public Address: STUN Server Address: VoIP and MultiMedia 2011 [email protected] 30/77
31 Universal Plug and Play (UPnP) Designed for zero-configuration networking and to allow devices to: dynamically join a network and obtain an IP address announce its name advertise capabilities discover other devices and their capabilities Makes it easy to: Learn the external (public) address of an internet gateway Enumerate existing port mappings Add and remove port mappings Assign lease times to mappings Standardized as a 73-part International Standard, ISO/IEC 29341, in December, VoIP and MultiMedia 2011 [email protected] 31/77
32 Relaying Media Symmetric /Firewall F1:P1 TURN Server Address: T Port: Pt Alice Address: Ap Port: Pa Call: To: B Media: T:Pt Symmetric /Firewall F1:p2 Bob Address: B VoIP and MultiMedia 2011 [email protected] 32/77
33 Relaying Media Symmetric /Firewall F1:P1 TURN Server Address: T Port: Pt Bob Address: B Alice Address: Ap Port: Pa Symmetric /Firewall F1:p2 VoIP and MultiMedia 2011 [email protected] 33/77
34 TURN Allocate Request x0003 Message Length Magic Cookie Transaction ID (96 bits) VoIP and MultiMedia 2011 [email protected] 34/77
35 Relaying Media The SIP Way Latching /Firewall SIP Server Address: T Port: Pt Alice Address: Ap Port: Pa Bob Address: B VoIP and MultiMedia 2011 [email protected] 35/77
36 Relaying Media The SIP Way Latching /Firewall SIP Server Address: T Port: Pt Alice Address: Ap Port: Pa Bob Address: B VoIP and MultiMedia 2011 [email protected] 36/77
37 Relaying Media SIP clients behind a symmetric /firewall non-scalable expensive complex symmetric firewall Relay Server SIP clients behind a symmetric / firewall symmetric /firewall VoIP and MultiMedia 2011 [email protected] 37/77
38 Using P2P networks for Traversal p2p Custom P2P network p2p p2p symmetric firewall p2p p2p custom p2p relay clients p2p Skype among the first to implement the technique p2p P2PSIP set off to imitate Skype. No conclusive results after four years p2p symmetric firewall Jingle Nodes an interesting alternative that is worth keeping an eye on custom p2p clients VoIP and MultiMedia /77
39 Could we please have IPv6 now? ok, it s probably high time we moved to IPv6 VoIP and MultiMedia 2011 [email protected] 39/77
40 Could we please have IPv6 now? this should simplify VoIP shouldn t it? VoIP and MultiMedia 2011 [email protected] 40/77
41 VoIP and IPv6 demo version network core (registrars, proxies, ) Bob 2001:660::1 Alice 2001:660::2 VoIP and MultiMedia 2011 [email protected] 41/77
42 VoIP and IPv6 demo version network core (registrars, proxies, ) Bob 2001:660::1 Alice 2001:660::2 VoIP and MultiMedia 2011 [email protected] 42/77
43 VoIP and IPv6 demo version network core (registrars, proxies, ) MEDIA Bob 2001:660::1 Alice 2001:660::2 VoIP and MultiMedia 2011 [email protected] 43/77
44 Reality check! Reality check! VoIP and MultiMedia /77
45 Reality check! VPN Priv: Pub: Stun Relay Server Alice 2001:660:: SIP network Bob Alice s list of addresses: 2001:660:: VoIP and MultiMedia 2011 [email protected] 45/77
46 How to avoid relaying? Interactive Connectivity Establishment (ICE) An IETF RFC brought to you by Skype s Jonathan Rosenberg VoIP and MultiMedia 2011 [email protected] 46/77
47 Address management with ICE VPN Priv: Pub: Stun Relay Server Alice SIP network Bob Please try me on any of Alice s list of addresses: the following: 2001:660::2 2001:660:: VoIP and MultiMedia [email protected] 47/77
48 Address management with ICE ERROR ERROR VPN Priv: Pub: Stun Relay Server Alice SIP network Bob ERROR Alice s list of addresses: 2001:660:: ERROR ERROR :660:: VoIP and MultiMedia 2011 [email protected] 48/77
49 Make no assumptions on: Network topologies behaviors location or presence ICE Design Goals High reliability is essential 90% is not good enough Simple topologies yield simple flows and faster establishment, complex topologies yield complex flows and slower establishment Try to minimize length of the path between clients VoIP and MultiMedia /77
50 The ICE 9-Step Program to Recovery Step 1: Allocation Step 2: Prioritization Step 3: Initiation Step 4: Allocation Step 5: Information Step 6: Verification Step 7: Coordination Step 8: Communication Step 9: Confirmation VoIP and MultiMedia /77
51 ICE Step 1: Allocation Before initiating the session, the Client Gathers Candidates Relay Relayed candidates reside on a host acting as a relay towards the agent Each candidate is a potential address for receiving traffic Three different types of candidates Host Candidates Server Reflexive Candidates Relayed Candidates Host Candidates reside on the agent itself Server Reflexive candidates are addresses residing on a VoIP and MultiMedia 2011 [email protected] 51/77
52 Using TURN to Obtain Candidates Server reflexive and relayed candidates are learned jointly by talking to a TURN server Client sends query to TURN server TURN Server :8200 Query passes through, creates bindings TURN server allocates a relayed address and also reports back source address of request to client This will be the server reflexive address Allocate Request Allocate Response reflexive= :1000 relayed= : : :500 VoIP and MultiMedia 2011 [email protected] 52/77
53 Pacing of Allocations If a client has Multiple interfaces Multiple IP address versions Multiple STUN servers Multiple media streams Multiple components This can produce a lot of allocation traffic Overload has been reported in the wild s fail to maintain bindings when created too fast For this reason, ICE paces allocations Tries to align with media rate Two problems Network congestion Overload VoIP and MultiMedia 2011 [email protected] 53/77
54 ICE Step 2: Prioritization priority = (2^24)*(type preference) +(2^8)*(local preference) +(2^0)*(256 - component ID) Type Preference Local Preference Component ID 32 bits Type-Preference: Preference for type (host, server reflexive, relayed) Usually 0 for relayed, 126 for host Local Preference: Amongst candidates of same type, preference for them If host is multihomed, preference by interface If host has multiple STUN or TURN servers, preference for that server Component ID for grouping candidates that all must work as an atomic unit This algorithm is only SHOULD strength VoIP and MultiMedia 2011 [email protected] 54/77
55 Visualization: Priority Space Interface 1 Component 1 Component 2 Host Candidates Interface 2 Server Reflexive Candidates VoIP and MultiMedia 2011 [email protected] 55/77
56 ICE Step 3: Initiation Originator sends an offer message to recipient through rendezvous server i.e., SDP offer in SIP INVITE Offer contains, for each candidate: IP address and port Component ID Foundation Transport Protocol Priority Type Related Address Username fragment and Password Offer RVz Srvr VoIP and MultiMedia /77
57 v=0 o=user IP s=. t=0 0 c=in IP m=audio RTP/AVP 0 a=rtpmap:0 PCMU/8000 M=video RTP/AVP 99 a=rtpmap:99 H264/90000 VoIP and MultiMedia 2011 [email protected] 57/77
58 A Sample ICE Offer v=0 o=ice4j.org 0 0 IN IP s=c=in IP t=0 0 a=ice-pwd:3mic8j25sf8m7e583kcr15d860 a=ice-ufrag:34d7g m=audio 1029 RTP/AVP 0 a=candidate:4 1 udp a01:e35:8a55:abc0:21e:c2ff:fe1b:2fe 2020 typ host a=candidate:2 1 udp fe80:0:0:0:21e:52ff:fec6:c65c 2020 typ host a=candidate:5 1 udp fe80:0:0:0:21e:c2ff:fe1b:2fe 2020 typ host a=candidate:1 1 udp typ host a=candidate:3 1 udp typ host a=candidate:6 1 udp typ srflx raddr rport 2020 a=candidate:4 2 udp a01:e35:8a55:abc0:21e:c2ff:fe1b:2fe 2021 typ host a=candidate:2 2 udp fe80:0:0:0:21e:52ff:fec6:c65c 2021 typ host a=candidate:5 2 udp fe80:0:0:0:21e:c2ff:fe1b:2fe 2021 typ host a=candidate:1 2 udp typ host a=candidate:3 2 udp typ host a=candidate:6 2 udp typ srflx raddr rport 2021 m=video 1031 RTP/AVP 0 a=candidate:4 1 udp a01:e35:8a55:abc0:21e:c2ff:fe1b:2fe 2022 typ host a=candidate:2 1 udp fe80:0:0:0:21e:52ff:fec6:c65c 2022 typ host a=candidate:5 1 udp fe80:0:0:0:21e:c2ff:fe1b:2fe 2022 typ host a=candidate:1 1 udp typ host a=candidate:3 1 udp typ host a=candidate:6 1 udp typ srflx raddr rport 2022 a=candidate:4 2 udp a01:e35:8a55:abc0:21e:c2ff:fe1b:2fe 2023 typ host a=candidate:2 2 udp fe80:0:0:0:21e:52ff:fec6:c65c 2023 typ host a=candidate:5 2 udp fe80:0:0:0:21e:c2ff:fe1b:2fe 2023 typ host a=candidate:1 2 udp typ host a=candidate:3 2 udp typ host VoIP and MultiMedia 2011 [email protected] 58/77 a=candidate:6 2 udp typ srflx raddr rport 2023
59 ICE Step 4: Allocation Recipient party does exactly same processing as originator and obtains its candidates Recommended to not yet ring the phone (for SIP)! Allocate Request TURN Server Allocate Response VoIP and MultiMedia /77
60 ICE Step 5: Information Recipient sends response containing an answer Answer contains same information as offer did Rvz Srvr answer VoIP and MultiMedia /77
61 ICE Step 6: Verification Each agent pairs up its candidates (local) with its peers (remote) to form candidate pairs Each agent sends a connectivity check at media pacing, in pair priority order Binding Request from the local candidate to the remote candidate TURN Server 5 TURN Server 4 Upon receipt of the request the peer agent generates a response 2 Contains a mapped address indicating the source IP and port seen in the request 3 If the response is received the check has succeeded 1 VoIP and MultiMedia 2011 [email protected] 61/77
62 Authenticating STUN STUN Connectivity checks are authenticated and integrity protected Authentication is based on a username and password Offer Ufrag: AUF Password:APASS Rvz Srvr Answer Ufrag: BUF Password:BPASS Username is constructed by combining username fragments exchanged in offer and answer separated by colon Password is exchanged in offer/ answer Username and password are same for all candidates in a media stream Username: BUF:AUF Password: BPASS Stun requests Username: AUF:BUF Password: APASS VoIP and MultiMedia 2011 [email protected] 62/77
63 Pairing up Candidates O-P: Offerers Priority A-P: Answerers Priority pair priority = 2^32*MIN(O-P,A-P) + 2*MAX(O-P,A-P) + (O-P>A-P?1:0) Minimum Priority Maximum Priority 64 bits Pairs are sorted in order of decreasing pair priority Each agent will end up with the same list Last term serves as a tie breaker Min/Max results in highest priority for pair with two host RTP candidates, lowest for pair with two relayed RTCP VoIP and MultiMedia 2011 [email protected] 63/77
64 Frozen Algorithm ICE provides an optimization called the Frozen algorithm Applicable when checks need to be done for multiple components or sessions Main idea is to use the results of a previous check to predict the likelihood of a future one working Basic algorithm First, check the candidate pairs for first component of the first session Once one succeeds, then check the other components for the first session that are similar Once those are done, check all other components for all other media streams that are similar Candidates are similar when they are of the same type and obtained from the same interface and STUN or TURN server Same foundation VoIP and MultiMedia 2011 [email protected] 64/77
65 Visualizing Frozen Algorithm 9999 Host Candidates Interface 1 Component 1 Component 2 Interface Server Reflexive Candidates Pairs containing the red candidate pairs Will be Waiting, all others Frozen VoIP and MultiMedia 2011 [email protected] 65/77
66 Visualizing Frozen Algorithm 9999 Host Candidates Interface 1 Component 1 Component 2 Interface Server Reflexive Candidates Check on interface succeeds (in Green). Component 2 for same foundation is now Waiting to go and will be done next VoIP and MultiMedia 2011 [email protected] 66/77
67 Peer Reflexive Candidates Connectivity checks can produce additional candidates Peer reflexive candidates Typically happens when there is a symmetric between users Peer reflexive candidate will be discovered by both users For user A, from the Response For user B, from the Request Allows direct media even in the presence of symmetric! allocates new binding towards B A STUN Request A learns a new local candidate towards B! Sym STUN Response B informs A of new binding B VoIP and MultiMedia 2011 [email protected] 67/77
68 ICE Step 7: Coordination ICE needs to finalize on a candidate pair for each component of each media stream More than one may work Each agent needs to conclude on the same set of pairs Finalization takes place without signaling through rendezvous server all through STUN VoIP and MultiMedia 2011 [email protected] 68/77
69 Agent Roles One agent acts as the controlling agent, the other as the controlled agent Controlling agent is normally the offerer, unless offerer signals it is an ICE lite implementation Controlling agent responsible for Deciding when STUN checks should finish Deciding which pairs to use once it is finished VoIP and MultiMedia /77
70 Why not just use the first pair? ICE checks proceed in priority order So why not just stop once the first check succeeds, and use that? Several reasons Packet loss on a higher priority check may delay it from finishing giving checks more time may produce better results An agent may have other criteria for choosing pairs (for example RTT estimates!) VoIP and MultiMedia 2011 [email protected] 70/77
71 Signaling Completion When controlling agent is done, it inserts a flag into a STUN check If controlled agent had successfully completed a check in reverse direction, it stops checks for that component of that stream Both agents use the pair generated by the check that included the flag STUN Request STUN Response STUN Request+ flag STUN Response done Controlling Controlled VoIP and MultiMedia 2011 [email protected] 71/77
72 ICE Lite ICE Supports an implementation level called ICE lite Used for endpoints that always have public IP PSTN gateways Media servers Conference servers These endpoints need to run ICE for ICE to be used, but don t themselves have a problem An agent signals its lite in offer or answer If both agents are lite no checks or state machinery is used A lite agent has a single v4 candidate (host only) and only needs to Receive a STUN check and send a response Process offers and answers Use the candidate pair based on done flag in STUN VoIP and MultiMedia 2011 [email protected] 72/77
73 ICE Step 8: Communication Media can flow in each direction once pairs have been selected by the controlling agent for each component Allows early media in both directions STUN Server STUN Server VoIP and MultiMedia /77
74 ICE Step 9: SIP-specific fix-up If m/c-line in original INVITE didn t match candidate pairs selected by ICE, controlling agent does a re-invite to place them in m/c-line Re-INVITE ensures that middleboxes have the correct media address QoS installation (i.e., IMS or Packetcable) Diagnostic tools Monitoring applications Firewalls Re-INVITE 200 OK ACK Offerer Answerer VoIP and MultiMedia 2011 [email protected] 74/77
75 and Firewall Traversal VoIP and MultiMedia /77
OSSIR, November 2010 [email protected] 1/45
OSSIR, November 2010 [email protected] 1/45 Real-time Communication Applications OSSIR, November 2010 [email protected] 2/45 Protocols sip & xmpp OSSIR, November 2010 [email protected]
NAT Traversal in SIP. Baruch Sterman, Ph.D. Chief Scientist [email protected]. David Schwartz Director, Telephony Research davids@deltathree.
Baruch Sterman, Ph.D. Chief Scientist [email protected] David Schwartz Director, Telephony Research [email protected] Table of Contents 2 3 Background Types of Full Cone Restricted Cone Port Restricted
NAT Traversal for VoIP. Ai-Chun Pang Graduate Institute of Networking and Multimedia Dept. of Comp. Sci. and Info. Engr. National Taiwan University
NAT Traversal for VoIP Ai-Chun Pang Graduate Institute of Networking and Multimedia Dept. of Comp. Sci. and Info. Engr. National Taiwan University 1 What is NAT NAT - Network Address Translation RFC 3022
Media Gateway Controller RTP
1 Softswitch Architecture Interdomain protocols Application Server Media Gateway Controller SIP, Parlay, Jain Application specific Application Server Media Gateway Controller Signaling Gateway Sigtran
VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution
ACCEPTED FROM OPEN CALL VoIP and NAT/Firewalls: Issues, Traversal Techniques, and a Real-World Solution Hechmi Khlifi, Jean-Charles Grégoire, and James Phillips, Université du Québec ABSTRACT In spite
Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking
Advanced Networking Voice over IP & Other Multimedia Protocols Renato Lo Cigno SIP: Session Initiation Protocol Defined by IETF RFC 2543 (first release march 1999) many other RFCs... see IETF site and
NAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:[email protected] http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: [email protected].
SIP OVER NAT Pavel Segeč University of Žilina, Faculty of Management Science and Informatics, Slovak Republic e-mail: [email protected] Abstract Session Initiation Protocol is one of key IP communication
NTP VoIP Platform: A SIP VoIP Platform and Its Services
NTP VoIP Platform: A SIP VoIP Platform and Its Services Speaker: Dr. Chai-Hien Gan National Chiao Tung University, Taiwan Email: [email protected] Date: 2006/05/02 1 Outline Introduction NTP VoIP
How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib
NetVanta Unified Communications Technical Note The Purpose of a SIP-Aware Firewall/ALG Introduction This technical note will explore the purpose of a Session Initiation Protocol (SIP)-aware firewall/application
Voice over IP (SIP) Milan Milinković [email protected] 30.03.2007.
Voice over IP (SIP) Milan Milinković [email protected] 30.03.2007. Intoduction (1990s) a need for standard protocol which define how computers should connect to one another so they can share media and
Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol
Adding Multi-Homing and Dual-Stack Support to the Session Initiation Protocol Mario Baldi, Fulvio Risso, Livio Torrero Dipartimento di Automatica e Informatica, Politecnico di Torino, Torino, Italy {mario.baldi,
VoIP LAB. 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 Email: [email protected] TEL: 03-9357400 # 255
SIP Traversal over NAT 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 Email: [email protected] TEL: 03-9357400 # 255 Outline Introduction to SIP and NAT NAT Problem Definition NAT Solutions on NTP VoIP
Three-Way Calling using the Conferencing-URI
Three-Way Calling using the Conferencing-URI Introduction With the deployment of VoIP users expect to have the same functionality and features that are available with a landline phone service. This document
NAT and Firewall Traversal with STUN / TURN / ICE
NAT and Firewall Traversal with STUN / TURN / ICE Simon Perreault Viagénie {mailto sip}:[email protected] http://www.viagenie.ca Credentials Consultant in IP networking and VoIP at Viagénie.
Adaptation of TURN protocol to SIP protocol
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 2, January 2010 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 78 Adaptation of TURN protocol to SIP protocol Mustapha GUEZOURI,
Internet Working 15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005
15th lecture (last but one) Chair of Communication Systems Department of Applied Sciences University of Freiburg 2005 1 43 administrational stuff Next Thursday preliminary discussion of network seminars
TECHNICAL SUPPORT NOTE. 3-Way Call Conferencing with Broadsoft - TA900 Series
Page 1 of 6 TECHNICAL SUPPORT NOTE 3-Way Call Conferencing with Broadsoft - TA900 Series Introduction Three way calls are defined as having one active call and having the ability to add a third party into
SIP: Protocol Overview
SIP: Protocol Overview NOTICE 2001 RADVISION Ltd. All intellectual property rights in this publication are owned by RADVISION Ltd. and are protected by United States copyright laws, other applicable copyright
Multimedia & Protocols in the Internet - Introduction to SIP
Information and Communication Networks Multimedia & Protocols in the Internet - Introduction to Siemens AG 2004 Bernard Hammer Siemens AG, München Presentation Outline Basics architecture Syntax Call flows
Network Convergence and the NAT/Firewall Problems
Network Convergence and the NAT/Firewall Problems Victor Paulsamy Zapex Technologies, Inc. Mountain View, CA 94043 Samir Chatterjee School of Information Science Claremont Graduate University Claremont,
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW
3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW SIP is an application layer protocol that is used for establishing, modifying and terminating multimedia sessions in an Internet Protocol (IP) network. SIP
Mobile P2PSIP. Peer-to-Peer SIP Communication in Mobile Communities
Mobile P2PSIP -to- SIP Communication in Mobile Communities Marcin Matuszewski, Esko Kokkonen Nokia Research Center Helsinki, Finland [email protected], [email protected] Abstract This
Internet Voice, Video and Telepresence Harvard University, CSCI E-139. Lecture #5
Internet Voice, Video and Telepresence Harvard University, CSCI E-139 Lecture #5 Instructor: Len Evenchik [email protected] sip:[email protected] AT&T Dimension PBX, 1980 Lecture Agenda Welcome
TECHNICAL CHALLENGES OF VoIP BYPASS
TECHNICAL CHALLENGES OF VoIP BYPASS Presented by Monica Cultrera VP Software Development Bitek International Inc 23 rd TELELCOMMUNICATION CONFERENCE Agenda 1. Defining VoIP What is VoIP? How to establish
Application Note. Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0
Application Note Firewall Requirements for the Onsight Mobile Collaboration System and Hosted Librestream SIP Service v5.0 1 FIREWALL REQUIREMENTS FOR ONSIGHT MOBILE VIDEO COLLABORATION SYSTEM AND HOSTED
Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS
Multimedia Communication in the Internet SIP: Advanced Topics Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS SIP and NAT NAT Concept NAT = Network Address Translation Share one IP address
EE4607 Session Initiation Protocol
EE4607 Session Initiation Protocol Michael Barry [email protected] [email protected] Outline of Lecture IP Telephony the need for SIP Session Initiation Protocol Addressing SIP Methods/Responses Functional
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University
SIP: NAT and FIREWALL TRAVERSAL Amit Bir Singh Department of Electrical Engineering George Washington University ABSTRACT The growth of market for real-time IP communications is a big wave prevalent in
Internet Engineering Task Force (IETF) Request for Comments: 7088 Category: Informational February 2014 ISSN: 2070-1721
Internet Engineering Task Force (IETF) D. Worley Request for Comments: 7088 Ariadne Category: Informational February 2014 ISSN: 2070-1721 Abstract Session Initiation Protocol Service Example -- Music on
Mobicents 2.0 The Open Source Communication Platform. DERUELLE Jean JBoss, by Red Hat 138
Mobicents 2.0 The Open Source Communication Platform DERUELLE Jean JBoss, by Red Hat 138 AGENDA > VoIP Introduction > VoIP Basics > Mobicents 2.0 Overview SIP Servlets Server JAIN SLEE Server Media Server
SIP and ENUM. Overview. 2005-03-01 ENUM-Tag @ DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP
and ENUM 2005-03-01 ENUM-Tag @ DENIC Jörg Ott 2005 Jörg Ott 1 Overview Introduction to Addresses and Address Resolution in ENUM & Peer-to-Peer for Telephony Conclusion 2005 Jörg Ott
Application Note. Onsight Connect Network Requirements V6.1
Application Note Onsight Connect Network Requirements V6.1 1 ONSIGHT CONNECT SERVICE NETWORK REQUIREMENTS... 3 1.1 Onsight Connect Overview... 3 1.2 Onsight Connect Servers... 4 Onsight Connect Network
SIP Security. ENUM-Tag am 28. September in Frankfurt. Prof. Dr. Andreas Steffen. Agenda. [email protected]
ENUM-Tag am 28. September in Frankfurt SIP Security Prof. Dr. Andreas Steffen [email protected] Andreas Steffen, 28.09.2004, ENUM_SIP.ppt 1 Agenda SIP The Session Initiation Protocol Securing the
Session Initiation Protocol (SIP)
SIP: Session Initiation Protocol Corso di Applicazioni Telematiche A.A. 2006-07 Lezione n.7 Ing. Salvatore D Antonio Università degli Studi di Napoli Federico II Facoltà di Ingegneria Session Initiation
Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University
Session Initiation Protocol oco (SIP) Part II Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University Email: [email protected]
IP Office Technical Tip
IP Office Technical Tip Tip no: 200 Release Date: January 23, 2008 Region: GLOBAL IP Office Session Initiation Protocol (SIP) Configuration Primer There are many Internet Telephony Service Providers (ITSP)
SIP Basics. CSG VoIP Workshop. Dennis Baron January 5, 2005. Dennis Baron, January 5, 2005 Page 1. np119
SIP Basics CSG VoIP Workshop Dennis Baron January 5, 2005 Page 1 Outline What is SIP SIP system components SIP messages and responses SIP call flows SDP basics/codecs SIP standards Questions and answers
internet technologies and standards
Institute of Telecommunications Warsaw University of Technology 2015 internet technologies and standards Piotr Gajowniczek Andrzej Bąk Michał Jarociński multimedia in the Internet Voice-over-IP multimedia
Technical Bulletin 25751
25751 Secure Real-Time Transport Protocol on SoundPoint IP Phones This technical bulletin provides detailed information on how the SIP application has been enhanced to support Secure Real-Time Transport
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
Denial of Services on SIP VoIP infrastructures
Denial of Services on SIP VoIP infrastructures Ge Zhang Karlstad University [email protected] 1 Outline Background Denial of Service attack using DNS Conclusion 2 VoIP What is VoIP? What is its advantage?
Session Initiation Protocol
TECHNICAL OVERVIEW Session Initiation Protocol Author: James Wright, MSc This paper is a technical overview of the Session Initiation Protocol and is designed for IT professionals, managers, and architects
NTP VoIP Platform: A SIP VoIP Platform and Its Services 1
NTP VoIP Platform: A SIP VoIP Platform and Its Services 1 Whai-En Chen, Chai-Hien Gan and Yi-Bing Lin Department of Computer Science National Chiao Tung University 1001 Ta Hsueh Road, Hsinchu, Taiwan,
VoIP Security. Seminar: Cryptography and Security. 07.06.2006 Michael Muncan
VoIP Security Seminar: Cryptography and Security Michael Muncan Overview Introduction Secure SIP/RTP Zfone Skype Conclusion 1 Introduction (1) Internet changed to a mass media in the middle of the 1990s
Overview of VoIP Systems
2 Overview of VoIP Systems In their simplest form, Voice over IP protocols simply enable two (or more) devices to transmit and receive real-time audio traffic that allows their respective users to communicate.
How to make free phone calls and influence people by the grugq
VoIPhreaking How to make free phone calls and influence people by the grugq Agenda Introduction VoIP Overview Security Conclusion Voice over IP (VoIP) Good News Other News Cheap phone calls Explosive growth
SIP Session Initiation Protocol Nicolas Montavont [email protected]
SIP Session Initiation Protocol Nicolas Montavont [email protected] SIP Session Initiation Protocol Henning Schulzrinne Department of Computer Science Columbia University, New York,
This specification this document to get an official version of this User Network Interface Specification
This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into
WebSOCKET based Real time text (RTT) WebRTC gateway For WebRTC and SIP interop. Version 2.5a. Projet Sécuritas
WebSOCKET based Real time text (RTT) WebRTC gateway For WebRTC and SIP interop Version 2.5a Projet Sécuritas Authors: Emmanuel Buu, Ivés. [email protected] www.ives.fr Gunnar Hellström, Omnitor. [email protected]
A Comparative Study of Signalling Protocols Used In VoIP
A Comparative Study of Signalling Protocols Used In VoIP Suman Lasrado *1, Noel Gonsalves *2 Asst. Prof, Dept. of MCA, AIMIT, St. Aloysius College (Autonomous), Mangalore, Karnataka, India Student, Dept.
Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: [email protected] TEL: 03-9357400 # 340
Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 Email: [email protected] TEL: 03-9357400 # 340 Outline Session Initiation Protocol SIP Extensions SIP Operation
VoIP. What s Voice over IP?
VoIP What s Voice over IP? Transmission of voice using IP Analog speech digitized and transmitted as IP packets Packets transmitted on top of existing networks Voice connection is now packet switched as
How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication?
How will the Migration from IPv4 to IPv6 Impact Voice and Visual Communication? Nick Hawkins Director, Technology Consulting Polycom, Inc. All rights reserved. Agenda Introduction & standards Requirements
Identity based Authentication in Session Initiation. Session Initiation Protocol
Identity based Authentication in Session Initiation by Harsh Kupwade Southern Methodist University Dean Willis Softarmor LLC Thomas M. Chen Swansea University Nhut Nguyen Samsung Telecommunications 1 Session
IP-Telephony SIP & MEGACO
IP-Telephony SIP & MEGACO Bernard Hammer Siemens AG, Munich Siemens AG 2001 1 Presentation Outline Session Initiation Protocol Introduction Examples Media Gateway Decomposition Protocol 2 IETF Standard
SIP ALG - Session Initiated Protocol Applications- Level Gateway
SIP ALG is a parameter that is generally enabled on most commercial router because it helps to resolve NAT related problems. However, this parameter can be very harmful and can actually stop SIP Trunks
NAT Traversal for VoIP
NAT Traversal for VoIP Dr. Quincy Wu National Chi Nan University Email: [email protected] 1 TAC2000/2000 NAT Traversal Where is NAT What is NAT Types of NAT NAT Problems NAT Solutions Program Download
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
White paper. SIP An introduction
White paper An introduction Table of contents 1 Introducing 3 2 How does it work? 3 3 Inside a normal call 4 4 DTMF sending commands in sip calls 6 5 Complex environments and higher security 6 6 Summary
Firewall Support for SIP
Firewall Support for SIP The Firewall Support for SIP feature integrates Cisco IOS firewalls, Voice over IP (VoIP) protocol, and Session Initiation Protocol (SIP) within a Cisco IOS-based platform, enabling
Session Initiation Protocol (SIP) The Emerging System in IP Telephony
Session Initiation Protocol (SIP) The Emerging System in IP Telephony Introduction Session Initiation Protocol (SIP) is an application layer control protocol that can establish, modify and terminate multimedia
Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany
Service Provider implementation of SIP regarding security Vesselin Tzvetkov, Holger Zuleger {vesselin.tzvetkov, holger.zuleger}@arcor.net Arcor AG&Co KG, Alfred-Herrhausen-Allee 1, 65760 Eschborn, Germany
Security Issues of SIP
Master Thesis Electrical Engineering Thesis no: MEE10:74 June 2010 BLEKINGE INSTITUTE OF TECHNOLOGY SCHOOL OF ENGINEERING DEPARTMENT OF TELECOMMUNICATION SYSTEMS Security Issues of SIP MASTER S THESIS
SIP Session Initiation Protocol
SIP Session Initiation Protocol Laurent Réveillère Enseirb Département Télécommunications [email protected] Session Initiation Protocol Raisin 2007 Overview This is a funny movie! I bet Laura would
Session Initiation Protocol and Services
Session Initiation Protocol and Services Harish Gokul Govindaraju School of Electrical Engineering, KTH Royal Institute of Technology, Haninge, Stockholm, Sweden Abstract This paper discusses about the
VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009
VoIP some threats, security attacks and security mechanisms Lars Strand RiskNet Open Workshop Oslo, 24. June 2009 "It's appalling how much worse VoIP is compared to the PSTN. If these problems aren't fixed,
802.11: Mobility Within Same Subnet
What is Mobility? Spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same AP mobile user, (dis) connecting from using DHCP mobile user, passing through multiple
Session Border Controller
CHAPTER 13 This chapter describes the level of support that Cisco ANA provides for (SBC), as follows: Technology Description, page 13-1 Information Model Objects (IMOs), page 13-2 Vendor-Specific Inventory
Advanced Networking Voice over IP & Other Multimedia Protocols
Advanced Networking Voice over IP & Other Multimedia Protocols Renato Lo Cigno SIP: Session Initiation Protocol Defined by IETF RFC 2543 (first release march 1999) many other RFCs... see IETF site and
VoIP with SIP. Session Initiation Protocol RFC-3261/RFC-2543. [email protected]
VoIP with SIP Session Initiation Protocol RFC-3261/RFC-2543 [email protected] 1 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy Telephone 2 Legacy
Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya
Application Notes for IDT Net2Phone SIP Trunking Service with Avaya IP Office 8.1 - Issue 1.0
Avaya Solution & Interoperability Test Lab Application Notes for IDT Net2Phone SIP Trunking Service with Avaya IP Office 8.1 - Issue 1.0 Abstract These Application Notes describe the procedures for configuring
SIP Trunking and Voice over IP
SIP Trunking and Voice over IP Agenda What is SIP Trunking? SIP Signaling How is Voice encoded and transported? What are the Voice over IP Impairments? How is Voice Quality measured? VoIP Technology Confidential
SIP: Session Initiation Protocol. Copyright 2005 2008 by Elliot Eichen. All rights reserved.
SIP: Session Initiation Protocol Signaling Protocol Review H323: ITU peer:peer protocol. ISDN (Q.931) signaling stuffed into packets. Can be TCP or UDP. H225: Q931 for call control, RAS to resolve endpoints
Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme
Chapter 2: Representation of Multimedia Data Chapter 3: Multimedia Systems Communication Aspects and Services Multimedia Applications and Communication Protocols Quality of Service and Resource Management
Skype characteristics
Advanced Networking Skype Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Skype characteristics Skype is a well known P2P program for real time communications
SIP A Technology Deep Dive
SIP A Technology Deep Dive Anshu Prasad Product Line Manager, Mitel June 2010 Laith Zalzalah Director, Mitel NetSolutions What is SIP? Session Initiation Protocol (SIP) is a signaling protocol for establishing
Asymetrical keys. Alices computer generates a key pair. A public key: XYZ123345 (Used to encrypt) A secret key: ABC98765 (Used to decrypt)
Encryption keys Symmetrical keys Same key used for encryption and decryption Exchange of symmetrical keys between parties difficult without risk of interception Asymmetrical keys One key for encryption
Session Initiation Protocol (SIP)
Il protocollo SIP Session Initiation Protocol (SIP) SIP is the IETF s standard for establishing VoIP connections It is an application layer control protocol for creating, modifying and terminating sessions
Anat Bremler-Barr Ronit Halachmi-Bekel Jussi Kangasharju Interdisciplinary center Herzliya Darmstadt University of Technology
Unregister Attack in SIP Anat Bremler-Barr Ronit Halachmi-Bekel Jussi Kangasharju Interdisciplinary center Herzliya Darmstadt University of Technology Unregister Attack We present a new VoIP Denial Of
ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION
ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION 10 April 2009 Gömbös Attila, Horváth Géza About SIP-to-PSTN connectivity 2 Providing a voice over IP solution that will scale to PSTN call volumes,
Configuring SIP Support for SRTP
Configuring SIP Support for SRTP This chapter contains information about the SIP Support for SRTP feature. The Secure Real-Time Transfer protocol (SRTP) is an extension of the Real-Time Protocol (RTP)
Chapter 10 Session Initiation Protocol. Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University
Chapter 10 Session Initiation Protocol Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Outline 12.1 An Overview of SIP 12.2 SIP-based GPRS Push
ENUM: Migrating to VoIP. P2P Voice Applications
Advanced Networking ENUM: Migrating to VoIP P2P Voice Applications Renato Lo Cigno Credits for part of the original material to Saverio Niccolini NEC Heidelberg Index ENUM P2P Basics Overlay & P2P Does
Telecommunication Services Engineering (TSE) Lab. Chapter V. SIP Technology For Value Added Services (VAS) in NGNs
Chapter V SIP Technology For Value Added Services (VAS) in NGNs http://users.encs.concordia.ca/~glitho/ Outline 1. SIP 2. SIP servlets 3. Examples of services that may be implemented with SIP technology
Transparent weaknesses in VoIP
Transparent weaknesses in VoIP Peter Thermos [email protected] 2007 Palindrome Technologies, All Rights Reserved 1 of 56 Speaker Background Consulting Government and commercial organizations,
MyIC setup and configuration (with sample configuration for Alcatel Lucent test environment)
MyIC setup and configuration (with sample configuration for Alcatel Lucent test environment) N.B. Goto MyIC Preferences in the System Toolbar. Description: this may be any appropriate description of the
Dial91 iphone User Guide
Dial91 iphone User Guide Dial91 iphone Edition User Guide 1 About Dial91 iphone Edition Dial91 iphone Edition is a SIP-based phone for the Apple iphone mobile digital device, and ipod touch mobile digital
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments 1 Dorgham Sisalem, Jiri Kuthan Fraunhofer Institute for Open Communication Systems (FhG Fokus) Kaiserin-Augusta-Allee
An outline of the security threats that face SIP based VoIP and other real-time applications
A Taxonomy of VoIP Security Threats An outline of the security threats that face SIP based VoIP and other real-time applications Peter Cox CTO Borderware Technologies Inc VoIP Security Threats VoIP Applications
End-2-End QoS Provisioning in UMTS networks
End-2-End QoS Provisioning in UMTS networks Haibo Wang Devendra Prasad October 28, 2004 Contents 1 QoS Support from end-to-end viewpoint 3 1.1 UMTS IP Multimedia Subsystem (IMS)................... 3 1.1.1
Request for Comments: 4579. August 2006
Network Working Group Request for Comments: 4579 BCP: 119 Category: Best Current Practice A. Johnston Avaya O. Levin Microsoft Corporation August 2006 Status of This Memo Session Initiation Protocol (SIP)
Creating your own service profile for SJphone
SJ Labs, Inc. 2005 All rights reserved SJphone is a registered trademark. No part of this document may be copied, altered, or transferred to, any other media without written, explicit consent from SJ Labs
District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification
1.1 Multipoint Control Unit (MCU) A. The MCU shall be capable of supporting (20) continuous presence HD Video Ports at 720P/30Hz resolution and (40) continuous presence ports at 480P/30Hz resolution. B.
Unit 23. RTP, VoIP. Shyam Parekh
Unit 23 RTP, VoIP Shyam Parekh Contents: Real-time Transport Protocol (RTP) Purpose Protocol Stack RTP Header Real-time Transport Control Protocol (RTCP) Voice over IP (VoIP) Motivation H.323 SIP VoIP
